Information Security Controls Quiz

Information Security Controls Quiz

Professional Development

22 Qs

quiz-placeholder

Similar activities

DCP Utilization and Maintenance

DCP Utilization and Maintenance

Professional Development

25 Qs

svsvs

svsvs

Professional Development

20 Qs

Quiz Fasilitator Pembelajaran Digital Bangka Belitung

Quiz Fasilitator Pembelajaran Digital Bangka Belitung

Professional Development

20 Qs

Prelim: Networking II

Prelim: Networking II

Professional Development

20 Qs

cryptography

cryptography

Professional Development

25 Qs

Remote Support and Scripting Best Practices

Remote Support and Scripting Best Practices

Professional Development

21 Qs

Information Security Controls Quiz

Information Security Controls Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Adrian Henderson

Used 1+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a technical control in information security?

Security policy enforcement

Intrusion Detection System (IDS)

User training program

Security camera installation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization installs a badge reader and surveillance cameras at all facility entrances. What type of control is this?

Operational

Managerial

Technical

Physical

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control type includes activities such as incident response planning and access reviews?

Physical

Operational

Managerial

Preventive

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following controls is designed to alert administrators to a security incident?

Preventive

Corrective

Detective

Compensating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a compensating control?

To prevent unauthorized access

To detect unusual activity

To serve as an alternative when primary controls fail

To guide user behavior through policies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of the Zero Trust model evaluates access policies before granting access?

Policy Enforcement Point

Policy Administrator

Policy Engine

Security Token Service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role does non-repudiation play in cybersecurity?

Prevents data interception

Ensures system redundancy

Proves an action or communication occurred

Encrypts user credentials

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?